Process of Network Security, The: Designing and Managing a Safe Network, 1st edition
Unfortunately, this item is not available in your country.
In The Process of Network Security, security specialist Thomas A. Wadlow reveals the approaches, techniques, and best practices that effectively secure the modern workplace. Written for network managers and administrators responsible for the security of large, enterprise-wide networks, this book focuses on security as a continuous process involving vigilant daily efforts in analysis, implementation, evaluation, and maintenance. It also emphasizes that in order to truly protect the enterprise, security professionals must consider not just individual machines, but the entire system--machines, people, and procedures.The Process of Network Security discusses the many issues involved and walks you through the specific steps of setting up a secure system, focusing on standard operating procedures and day-to-day operations and maintenance. Providing a broad perspective on the challenge of enterprise security, this book covers a wide range of topics, including:
- Understanding the nature of attacks and attackers
- Setting security goals
- Creating a secure network design
- Building a team
- Fortifying network components
- Implementing physical and personnel security
- Monitoring and ordering a network
- Discovering and handling an actual attack
- Dealing with law enforcement authorities
You will find many experience-based observations, insights, and sound advice to point you in the right direction and to help you avoid potentially dangerous pitfalls and threats that face your network security. The book also addresses the "catch-22" that security specialists face: how to demonstrate the value of security when proof of its success cannot always be thoroughly tracked or measured.
Written in a conversational tone, The Process of Network Security conveys both the specific information and the general mindset that will enable you to anticipate, prevent, and respond to network threats.
Table of contents
1. Understanding Security.
2. Writing a Security Policy.
3. Who Is Attacking You?
4. Security Design Process.
5. Building a Security Team.
6. Fortifying Network Components.
7. Personnel Security.
8. Physical Security.
9. Monitoring Your Network.
10. Auditing Your Network.
11. Quantifying the Value of Security.
12. Preparing for an Attack.
13. Handling an Attack.
15. Log Analysis.
16. Damage Control.
Appendix A: Glossary. 0201433176T04062001
Published by Addison-Wesley Professional (March 2nd 2000) - Copyright © 2000